Application Security for Rich Internet Applicationss (Jfokus 2012)johnwilander
油
The document discusses cross-site scripting (XSS) attacks and cross-site request forgery (CSRF) attacks against rich internet applications. It begins with an overview of XSS attacks, including reflected, stored, and DOM-based XSS. It then demonstrates real examples of XSS vulnerabilities and discusses challenges of properly preventing XSS. The document next covers CSRF attacks, how they work against RESTful APIs, and techniques for mounting multi-step semi-blind CSRF attacks using invisible iframes and timed GET/POST requests in a deterministic manner.
The document describes a circuit diagram with 7 resistors (R1-R7), 5 voltage sources (V1-V6), and 2 current sources (I1-I2). The resistors and voltage/current sources are connected in a specific configuration, with the resistors labeled at their connection points and the voltage/current sources labeled with their placement and direction.
A presentation on the programming language JavaScript. It covers types, object orientation, variables and scope, closures, the Crockford Module Pattern, loading and executing, imports and namespacing, and more. The language features are compared to Java throughout the slides.
Web Integration Patterns in the Era of HTML5johnwilander
油
Presentation given at OWASP BeNeLux November 2012 and GeekMeet Stockholm January 2013. Covers secure and robust integration patterns for the web using cross origin resource sharing (CORS), sandboxed iframes, and the postMessage API.
The document proposes converting traditional locks to smart locks controlled by smartphones to address issues with key management. A hardware and software solution is presented using a Raspberry Pi, servo motor, and microcontroller. 3D models are shown for a key holder, case, and mounting platform. The design aims to be secure, maintainable, portable, easy to assemble and power, and compatible with existing locks. Production preparation and special thanks are also noted.
The document discusses how to reduce costs when using AWS services for development and operations. It recommends optimizing solutions to only use the necessary AWS services, understanding pricing models, and monitoring metrics and costs. For development, it suggests using virtual environments like containers and local emulation tools. For operations, it advises monitoring performance, usage, and costs, and having countermeasures like refining processes, using more cost-effective services, and code refactoring to reduce expenses.
The document proposes converting traditional locks to smart locks controlled by smartphones to address issues with key management. A hardware and software solution is presented using a Raspberry Pi, servo motor, and microcontroller. 3D models are shown for a key holder, case, and mounting platform. The design aims to be secure, maintainable, portable, easy to assemble and power, and compatible with existing locks. Production preparation and special thanks are also noted.
The document discusses how to reduce costs when using AWS services for development and operations. It recommends optimizing solutions to only use the necessary AWS services, understanding pricing models, and monitoring metrics and costs. For development, it suggests using virtual environments like containers and local emulation tools. For operations, it advises monitoring performance, usage, and costs, and having countermeasures like refining processes, using more cost-effective services, and code refactoring to reduce expenses.
This document discusses converting a company's key-based door locks to smart locks controlled by smartphones to address problems with key handling. It proposes a hardware and software solution using a microcontroller, motor, and Raspberry Pi or ESP8266 connected to the company's intranet for full remote control of the smart locks from any smartphone. The design aims to be secure, maintainable, portable, easy to assemble and power, and fit existing locks. Cost estimates and suggestions to prepare for production are also provided.
This document provides an agenda for a 3-day training on Ruby on Rails. Day 1 introduces Ruby and the Rails framework. Day 2 focuses on creating a simple Rails application. Day 3 is for exercises and review. The document also discusses what Ruby and Rails are, their MVC architecture, and how to install Ruby on Rails on Windows.
This document provides an introduction and overview of Ruby on Rails (ROR). It discusses what Ruby and ROR are, how ROR uses the MVC framework, and how to install and set up a development environment for ROR. It also provides exercises and references for learning Ruby, creating simple ROR applications, and resources for additional tutorials.